You can use a dump to identify the name of the module in control
when a failure occurred.
- Find the program status word (PSW) in the dump. The instruction
address is the last 31 bits of the PSW. In Figure 1 the last 31 bits of the PSW, 000085C4, are the instruction
address.
Figure 1. Finding the address of
the errorJOB S1REP001 STEP AUDREPT TIME 123515 DATE 92281 ID = 000 CPUID = FF0158243090 PAGE 00000001
COMPLETION CODE SYSTEM = 0C4 REASON CODE = 00000010
PSW AT ENTRY TO ABEND 078D2000 000085C4 ILC 04 INTC 0010
PSW LOAD MODULE = EDGAUD ADDRESS = 000085C4 OFFSET = 00000214
ASCB: 00F97280
+0000 ASCB..... ASCB FWDP..... 00FBBD00 BWDP..... 00FBDB00 CMSF..... 00F51180 SVRB..... 008FF960
+0014 SYNC..... 000036F9 IOSP..... 00000000 TNEW..... 008E3D90 CPUS..... 00000001 ASID..... 0010
+0026 R026..... 0000 LL5...... 00 HLHI..... 01 DPHI..... 00 DP....... 85
+002C TRQP..... 80FD51E1 LDA...... 7FF15EB0 RSMF..... 00 R035..... 0000 TRQI..... 41
+0038 CSCB..... 05395960 TSB...... 00000000 EJST..... 0000000A 50995600
+0048 EWST..... A6686CCD 5A1FFD11 JSTL..... 000007D3 ECB...... 808FFE58 UBET..... A6684BE2
+005C TLCH..... 00000000 DUMP..... 008FF418 AFFN..... FFFF RCTF..... 00 FLG1..... 00
+0068 TMCH..... 00000000 ASXB..... 008FE038 SWCT..... A8D6 DSP1..... 00 FLG2..... 00
+0074 RSV...... 0000 SRBS..... 0000 LLSQ..... 00000000 RCTP..... 008FE240 LOCK..... 00000000
+0084 LSQH..... 00000000 QECB..... 00000000 MECB..... 40000000 OUCB..... 01C746F8 OUXB..... 01C70C28
+0098 FMCT..... 0000 LEVL..... 03 FL2A..... 00 XMPQ..... 00000000 IQEA..... 00000000
+00A4 RTMC..... 00000000 MCC...... 00000000 JBNI..... 00FA0DC4 JBNS..... 00FA0B18 SRQ1..... 00
- Obtain the abend address by subtracting the instruction length
code (ILC) from the instruction address.
000085C4 instruction address
- 4 instruction length code
________
000085C0 abend address
- Go to the abend address and scan backward until you find the module
name in the comment section or eyecatcher of the dump. The module
name is EDGname where EDG is the DFSMSrmm identifier and name is the module name suffix. In Figure 2, the module name is EDGAUD.
Figure 2. Finding the module name000083A0 00000000 00000000 00000000 00000000 47F0F138 2BC5C4C7 C1E4C440 4040F1F0 *.................01..EDGAUD 10*
000083C0 61F0F561 F9F2E5F0 F1D9F0F1 D4F0F040 D1C4E9F1 F1F5F040 D5D6D5C5 40404040 */05/92V01R02M00 JDZ11B4 NONE *
000083E0 C1D3D340 D9C9C7C8 E3E240D9 C5E2C5D9 E5C5C440 40404040 40404040 40404040 *ALL RIGHTS RESERVED *
00008400 40404040 40404040 40404040 F5F6F9F5 60C4C6F1 404DC35D 40C3D6D7 E8D9C9C7 * 5647-A01 © COPYRIG*
00008420 C8E340C9 C2D440C3 D6D9D74B 40F1F9F7 F96B40F1 F9F9F340 D3C9C3C5 D5E2C5C4 *HT IBM CORP. 1979, 2000 LICENSED*
00008440 40D4C1E3 C5D9C9C1 D3406040 D7D9D6C7 D9C1D440 D7D9D6D7 C5D9E3E8 40D6C640 * MATERIAL - PROGRAM PROPERTY OF *
00008460 C9C2D440 E4E240C7 96A58599 95948595 A340E4A2 8599A240 D985A2A3 998983A3 *IBM US GOVERNMENT USERS RESTRICT*
00008480 858440D9 898788A3 A2406040 40404040 E4A28540 84A49793 898381A3 89969540 *ED RIGHTS - USE DUPLICATION *
000084A0 96994084 89A28393 96A2A499 85409985 A2A39989 83A38584 4082A840 C7E2C140 *OR DISCLOSURE RESTRICTED BY GSA *
000084C0 C1C4D740 E2838885 84A49385 40C39695 A3998183 A340A689 A38840C9 C2D440C3 *ADP SCHEDULE CONTRACT WITH IBM C*
000084E0 9699974B 40000000 90ECD00C 18CF41AC 0FA04120 A4105020 D00850D0 200418D2 *ORP. .....}.........U.&}.&}...K*
00008500 58910000 4510C15C 8F0097F0 0A139110 A4D04780 A1400700 4510C170 8F009850 *.J....A*..P0..J.U}... ....A...Q.*
00008520 0A139110 A5304780 A1740700 4100C184 47F0C18C 40404040 40404040 1B110A08 *..J.V.........AD.0A........ ....*
00008540 5000A3E0 4100C19C 47F0C1A4 4040404 40404040 1B110A08 5000A3E4 4100C1B4 *&T\..A..0AU....... ....&TU..A.*
00008560 47F0C1BC 40404040 40404040 1B110A08 5000A3E8 4100C1CC 47F0C1D4 40404040 *.0A........ ....&TY..A..0AM....*
00008580 C1D9E240 1B110A08 5000A3EC 4100C1E4 47F0C1EC 40404040 40404040 1B110A08 *... ....&T...AU.0A........ ....*
000085A0 5000A3F0 4100C1FC 47F0C204 E2D6D9E3 40404040 1B110A08 5000A3F4 4110A73A *&T0..A..0B.SORT ....&T4..X.*
000085C0 4100A748 0A1812FF 4770C29C D407A748 A7484780 C29C0700 4510C230 800098B0 *..X.......B.M.X.X...B.....B...Q.*
000085E0 0A139110 A5904780 A1E44130 00044140 A9504110 A56058F1 00300CEF D2474000 *..J.V....U..... Z&.V-.1....K. .*
If your dump is in one of the system dump data sets, display the
titles of the dump data sets to find the dump number.
- Enter the system command:
DISPLAY DUMP,TITLE
- Then enter the system command:
DISPLAY DUMP,ERRDATA,DSN=xx
where xx is the dump number to display this output as shown in Figure 3: Figure 3. Sample dump output DUMP03 TITLE=EDGQMGR TRAPPED ABEND S0C4 U0000 AT 82C48534 IN
MODULE EDGQMGR , OFFSET 00029C.
DUMP TAKEN TIME=08.36.51 DATE=02/02/93
ERRORID=SEQ00196 CPU0000 ASID002A TIME=08.36.51
SYSTEM ABEND CODE=0C4 REASON CODE=0010
MODULE=EDGQMGR CSECT=********
PSW AT TIME OF ERROR=070C0000 82C48534 ILC=6 INT=10
TRANSLATION EXCEPTION ADDR=C3C5C542
ABENDING PROGRAM ADDR=02C48298 RECOVERY ROUTINE=********
GPR 0-3 00000000 00000002 00004080 02BD7008
GPR 4-7 02CAC000 02C12EA0 02C287F8 02CB9FE8
GPR 8-11 02C00A98 00008540 00008540 00F97678
GPR12-15 82C48298 02C12EA0 0000002A C3C5C540
- Inspect the title to obtain the module name, CSECT name, PSW,
and, in some cases the offset.
You can also use IPCS output to obtain the module and offset. In Figure 4, the module name is EDGBKUP and the offset
is +0560.
Figure 4. Sample IPCS output CPU STATUS:
PSW=078C2000 84FD2830 (RUNNING IN PRIMARY, KEY 8, AMODE 31, DAT ON)
DISABLED FOR PER
ASID(X'0407') 04FD2830. EDGBKUP+0560 IN EXTENDED CSA
ASCB1031 AT FBB380, JOB(DFRMM), FOR THE HOME ASID
ASXB1031 AT 8FE038 FOR THE HOME ASID. NO BLOCK IS DISPATCHED
HOME ASID: 0407 PRIMARY ASID: 0407 SECONDARY ASID: 0407